Google remove 9 apps from their google play store which is steal user facebook all personal information and send to their server through trozanised and all data already send to a black hat hacker u know the black hat hacker all work done for only financial profit so if your data will go in aContinue reading ” 6 million user data leaked”
Category Archives: Uncategorized
Dating and communication apps target indian army through spyware
This spyware as form of dating apps which is firstly find in dec 2019 and this form is pjobRAT spyware . Firstly we should know about pjobRAT (this is a way where all spyware attached files like .pdf, .ppdx etc exit from our system , and seen by us because this is exit hidden spywareContinue reading “Dating and communication apps target indian army through spyware”
69k LimeVPN users data breach
At Thursday, limeVPN will be offline LimVPN (the world fastest network service provider and it is known as the no. 1 in security safety ) so it can’t be believable by anyone through this site 69k user data leaked . According to reasearcher / 69,400 users data record hacked .According to them the hacker hackedContinue reading “69k LimeVPN users data breach”
GOVCOINS
Government launches govcoins to bring down Bitcoin Why government wants to bring down bitcoin ?? The government controls the country’s finance and economy with the help of central banks and financial institutions. After Bitcoin has become the mainstream, many central banks have lost their business, which is eventually a loss to the government. Thus, theContinue reading ” GOVCOINS”
LinkedIn data breach
What to do if u have been affected?? Remove your email address from your public LinkedIn profile to avoid it being scraped by a malicious third party in the future. Beware of suspicious LinkedIn messages and connection requests from strangers. Change the password of your LinkedIn and email accounts. Consider using a password manager to createContinue reading “LinkedIn data breach”
2FA Authentication
The first thing in this 2FA authentication is that clearly 2FA is secured than any other authentication method , because 2FA adds an extra step in your login process and enabling if for every account , could be a little tiresome , but an unprotected password will make it easier for fraudsters to gain accessContinue reading ” 2FA Authentication”
BITCOIN(TRENDING COIN)
Bitcoin is a digital currency which is created in 2009, it follows the ideas set out in a whitepaper by the mysterious person Satoshi Nakamoto . THe identity of the person who created this technology is still a mystery. this coin can’t see by anyone and can’t touch by anyone , meaning any government agenciesContinue reading ” BITCOIN(TRENDING COIN)”
Black hat hacker
Black hat hacker is a type of hacker they break into computer system with malicious intent . they break a network system for their financial gain and their profitable prospectus . they steal credit card , debit card information through some attacks like phishing attacks , dos attacks actully phishing attacks is the favourite attacksContinue reading ” Black hat hacker”
Ethical hacker
Ethical hacker is also known as white hat hacker and pentration tester , and they hack any computer or network system , to take a permission and their purpose for only to check defense system on your network or computer . Ethical hacker uses some tools like metasploit , nmap etc . their intention isContinue reading “Ethical hacker”
BUG
A bug is a type of error and flaws which is find in a software program , hardware according to NSA, a programmer skips a bug in one thousand line of codes and these bugs harmful for public and a useful for hackers (through these bugs create a backdoor and that is the pointContinue reading ” BUG”
